nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bayesian probability model for Android malware detection
|
Mat, Sharfah Ratibah Tuan |
|
|
8 |
3 |
p. 424-431 |
artikel |
2 |
A compression strategy to accelerate LSTM meta-learning on FPGA
|
Wang, NianYi |
|
|
8 |
3 |
p. 322-327 |
artikel |
3 |
ADAS-RL: Safety learning approach for stable autonomous driving
|
Lee, Dongsu |
|
|
8 |
3 |
p. 479-483 |
artikel |
4 |
Android malware dataset construction methodology to minimize bias–variance tradeoff
|
Lee, Shinho |
|
|
8 |
3 |
p. 444-462 |
artikel |
5 |
A new fitness function for tuning parameters of Peripheral Integral Derivative Controllers
|
Odili, Julius Beneoluchi |
|
|
8 |
3 |
p. 463-467 |
artikel |
6 |
CFLedger: Preventing chargeback fraud with blockchain
|
Liu, Dongjie |
|
|
8 |
3 |
p. 352-356 |
artikel |
7 |
Deep learning based detection and localization of road accidents from traffic surveillance videos
|
Pawar, Karishma |
|
|
8 |
3 |
p. 379-387 |
artikel |
8 |
Deep learning driven beam selection for orthogonal beamforming with limited feedback
|
Choi, Jinho |
|
|
8 |
3 |
p. 473-478 |
artikel |
9 |
Detection of fake news using deep learning CNN–RNN based methods
|
Sastrawan, I. Kadek |
|
|
8 |
3 |
p. 396-408 |
artikel |
10 |
Dew-based offline computing architecture for healthcare IoT
|
Medhi, Kishore |
|
|
8 |
3 |
p. 371-378 |
artikel |
11 |
Distributed CRC scheme for low-complexity successive cancellation flip decoding of polar codes
|
Kim, Haseong |
|
|
8 |
3 |
p. 409-413 |
artikel |
12 |
Disturbed-entropy: A simple data quality assessment approach
|
Li, Yang |
|
|
8 |
3 |
p. 309-312 |
artikel |
13 |
Flood video segmentation on remotely sensed UAV using improved Efficient Neural Network
|
Inthizami, Naili Suri |
|
|
8 |
3 |
p. 347-351 |
artikel |
14 |
Impact of STO and STO-estimation in DST-DCO-OFDM-based visible light communication systems
|
Vappangi, Suseela |
|
|
8 |
3 |
p. 414-418 |
artikel |
15 |
Improving defocus blur measures using robust regularization
|
Ali, Usman |
|
|
8 |
3 |
p. 468-472 |
artikel |
16 |
Intrinsic and extrinsic quality of data for open data repositories
|
González-Vidal, Aurora |
|
|
8 |
3 |
p. 328-333 |
artikel |
17 |
Investigation of human trust by identifying stimulated brain regions using electroencephalogram
|
Oh, Seeung |
|
|
8 |
3 |
p. 363-370 |
artikel |
18 |
Multitask learning-based secure transmission for reconfigurable intelligent surface-aided wireless communications
|
Moon, Sangmi |
|
|
8 |
3 |
p. 334-339 |
artikel |
19 |
Peer-to-peer trust management in intelligent transportation system: An Aumann’s agreement theorem based approach
|
T.R., Ramesh |
|
|
8 |
3 |
p. 340-346 |
artikel |
20 |
Performance analysis of physical-layer network coding with QPSK modulation in wireless IoT networks
|
Yeom, Jeong Seon |
|
|
8 |
3 |
p. 419-423 |
artikel |
21 |
Rate-energy region of MIMO systems with sustainable intelligent reflecting surface
|
Kim, Minsik |
|
|
8 |
3 |
p. 438-443 |
artikel |
22 |
Scalable extension of HEVC with adaptive de-blocking filter for bandwidth-limited applications
|
Balaji, L. |
|
|
8 |
3 |
p. 388-395 |
artikel |
23 |
Scour modeling using deep neural networks based on hyperparameter optimization
|
Asim, Mohammed |
|
|
8 |
3 |
p. 357-362 |
artikel |
24 |
Trustworthy handover in LEO satellite mobile networks
|
Jung, Soyi |
|
|
8 |
3 |
p. 432-437 |
artikel |
25 |
Uniting cyber security and machine learning: Advantages, challenges and future research
|
Wazid, Mohammad |
|
|
8 |
3 |
p. 313-321 |
artikel |